| Preface |
|
xi | |
| Introduction |
|
xiii | |
|
Chapter 1 Fundamentals of Network Security |
|
|
1 | (14) |
|
|
|
1 | (3) |
|
1.1.1 The main objectives of securing a network |
|
|
2 | (1) |
|
1.1.2 Information security terminology |
|
|
2 | (2) |
|
1.2 Types of network security |
|
|
4 | (1) |
|
|
|
4 | (1) |
|
|
|
4 | (1) |
|
1.2.3 Administrative security |
|
|
5 | (1) |
|
1.3 The main risks related to the logical security of the network |
|
|
5 | (3) |
|
1.3.1 Different kinds of network attacks |
|
|
5 | (2) |
|
1.3.2 Network security measures |
|
|
7 | (1) |
|
1.3.3 Vulnerability audit measures |
|
|
8 | (1) |
|
1.4 Exercises to test learning |
|
|
8 | (7) |
|
Chapter 2 Securing Network Devices |
|
|
15 | (26) |
|
2.1 Types of network traffic |
|
|
15 | (1) |
|
2.2 Securing the management plan |
|
|
16 | (1) |
|
|
|
16 | (1) |
|
2.4 Implementing connection restrictions |
|
|
17 | (1) |
|
2.4.1 Configuring a login banner |
|
|
17 | (1) |
|
2.4.2 Configuring connection parameters |
|
|
17 | (1) |
|
2.5 Securing access through console lines, VTY and auxiliaries |
|
|
18 | (1) |
|
2.5.1 Securing access through the console line and deactivating the auxiliary line |
|
|
18 | (1) |
|
2.5.2 Securing VTY access with ssh |
|
|
18 | (1) |
|
2.6 Allocation of administrative roles |
|
|
19 | (5) |
|
2.6.1 Privilege levels of the IOS system |
|
|
19 | (1) |
|
2.6.2 Configuring a privilege level |
|
|
19 | (1) |
|
2.6.3 Setting a privilege level per user |
|
|
20 | (1) |
|
2.6.4 Setting a privilege level for console, VTY, and auxiliary line access |
|
|
20 | (1) |
|
2.6.5 Securing access with the management of "views" and "super-views" |
|
|
21 | (1) |
|
2.6.6 Securing configuration files and the IOS system |
|
|
22 | (1) |
|
2.6.7 Using automated security features |
|
|
23 | (1) |
|
2.7 Securing the control plane |
|
|
24 | (2) |
|
|
|
24 | (1) |
|
|
|
24 | (1) |
|
2.7.3 Configuring OSPF protocol authentication |
|
|
24 | (1) |
|
2.7.4 Configuring E1GRP protocol authentication |
|
|
25 | (1) |
|
2.7.5 Configuring RIP authentication |
|
|
26 | (1) |
|
2.8 Exercises for application |
|
|
26 | (15) |
|
Chapter 3 Supervising a Computer Network |
|
|
41 | (26) |
|
|
|
41 | (1) |
|
3.2 Implementing an NTP server |
|
|
42 | (2) |
|
3.2.1 Introduction to the NTP |
|
|
42 | (1) |
|
|
|
42 | (1) |
|
|
|
43 | (1) |
|
3.3 Implementing a Syslog server |
|
|
44 | (2) |
|
3.3.1 Introduction to the Syslog |
|
|
44 | (1) |
|
|
|
45 | (1) |
|
3.3.3 Configuring a Syslog client |
|
|
46 | (1) |
|
3.4 Implementing the Simple Network Management Protocol (SNMP) |
|
|
46 | (4) |
|
3.4.1 Introducing the SNMP |
|
|
46 | (1) |
|
|
|
47 | (2) |
|
|
|
49 | (1) |
|
3.5 Exercises for application |
|
|
50 | (17) |
|
Chapter 4 Securing Access Using AAA |
|
|
67 | (12) |
|
|
|
67 | (1) |
|
|
|
68 | (3) |
|
4.2.1 Local AAA authentication |
|
|
68 | (1) |
|
4.2.2 AAA authentication based on a server |
|
|
69 | (2) |
|
|
|
71 | (1) |
|
|
|
71 | (1) |
|
4.5 Exercises for application |
|
|
72 | (7) |
|
Chapter 5 Using Firewalls |
|
|
79 | (22) |
|
5.1 Introducing firewalls |
|
|
80 | (1) |
|
|
|
80 | (1) |
|
5.3 Setting up a firewall |
|
|
80 | (1) |
|
5.4 Different firewall strategies |
|
|
81 | (1) |
|
|
|
81 | (3) |
|
|
|
81 | (1) |
|
5.5.2 The location of ACLs |
|
|
81 | (1) |
|
|
|
81 | (1) |
|
|
|
82 | (1) |
|
|
|
83 | (1) |
|
|
|
84 | (2) |
|
|
|
84 | (1) |
|
5.6.2 Types of security zones in a network |
|
|
84 | (1) |
|
5.6.3 Rules applied to interzone traffic |
|
|
85 | (1) |
|
|
|
86 | (1) |
|
|
|
86 | (1) |
|
|
|
86 | (1) |
|
|
|
86 | (1) |
|
5.9 Creating the Policy-Map to apply the Class-Maps |
|
|
87 | (1) |
|
5.10 Defining the zone pairs |
|
|
87 | (1) |
|
5.11 Applying the policy maps to the zone pairs |
|
|
87 | (1) |
|
5.12 Assigning interfaces to zones |
|
|
87 | (1) |
|
5.13 Exercises for application |
|
|
88 | (13) |
|
Chapter 6 Putting in Place an Intrusion Prevention System (IPS) |
|
|
101 | (24) |
|
6.1 Introduction to a detector |
|
|
102 | (1) |
|
6.2 The differences between an IDS and an IPS |
|
|
102 | (1) |
|
|
|
103 | (1) |
|
|
|
103 | (1) |
|
6.5 Modes of deploying IPS |
|
|
103 | (1) |
|
|
|
104 | (1) |
|
6.7 Detecting malicious traffic |
|
|
104 | (2) |
|
|
|
104 | (1) |
|
6.7.2 Signature-based detection |
|
|
104 | (1) |
|
6.7.3 Other modes of detecting malicious traffic |
|
|
105 | (1) |
|
6.8 Signature micro-engines |
|
|
106 | (1) |
|
6.9 Severity levels of the signatures |
|
|
107 | (1) |
|
6.10 Monitoring and managing alarms and alerts |
|
|
108 | (1) |
|
6.11 List of actions to be taken during an attack |
|
|
108 | (1) |
|
6.12 Configuration of an IOS IPS |
|
|
109 | (2) |
|
6.13 Recommended practices |
|
|
111 | (1) |
|
6.14 Exercises for application |
|
|
112 | (13) |
|
Chapter 7 Securing a Local Network |
|
|
125 | (18) |
|
|
|
125 | (1) |
|
7.2 Types of attacks on Layer 2 |
|
|
126 | (5) |
|
7.2.1 MAC address flooding attacks |
|
|
126 | (1) |
|
7.2.2 MAC spoofing attack |
|
|
127 | (1) |
|
7.2.3 The DHCP starvation attack |
|
|
127 | (1) |
|
7.2.4 VLAN hopping attacks |
|
|
128 | (2) |
|
|
|
130 | (1) |
|
7.3 The best security practices for protecting Layer 2 |
|
|
131 | (1) |
|
7.4 Exercises for application |
|
|
132 | (11) |
|
|
|
143 | (30) |
|
8.1 Basic concepts in cryptography |
|
|
143 | (1) |
|
|
|
143 | (1) |
|
|
|
144 | (1) |
|
8.2 The different classifications of cryptology |
|
|
144 | (5) |
|
8.2.1 Traditional cryptography |
|
|
145 | (1) |
|
8.2.2 Modern cryptography |
|
|
146 | (1) |
|
8.2.3 Symmetric and asymmetric encryption |
|
|
147 | (2) |
|
|
|
149 | (2) |
|
|
|
149 | (1) |
|
8.3.2 Diffie-Hellman key exchange |
|
|
149 | (2) |
|
|
|
151 | (1) |
|
|
|
151 | (1) |
|
8.6 Asymmetric cryptography |
|
|
151 | (8) |
|
|
|
151 | (1) |
|
|
|
152 | (1) |
|
|
|
153 | (2) |
|
8.6.4 Public key infrastructure |
|
|
155 | (4) |
|
8.7 Exercises for application |
|
|
159 | (14) |
|
|
|
173 | (16) |
|
|
|
173 | (3) |
|
9.1.1 Objectives of IPsec |
|
|
173 | (1) |
|
9.1.2 Basic IPsec protocols |
|
|
174 | (1) |
|
9.1.3 The IPsec framework |
|
|
174 | (1) |
|
9.1.4 The IPsec security association |
|
|
175 | (1) |
|
|
|
175 | (1) |
|
|
|
176 | (2) |
|
|
|
176 | (1) |
|
|
|
176 | (1) |
|
|
|
176 | (2) |
|
9.3 The site-to-site VPN configuration |
|
|
178 | (3) |
|
|
|
178 | (1) |
|
9.3.2 Configuration of IPsec VPN |
|
|
179 | (2) |
|
9.4 Exercises for application |
|
|
181 | (8) |
|
Chapter 10 Studying Advanced Firewalls |
|
|
189 | (54) |
|
|
|
189 | (9) |
|
|
|
189 | (1) |
|
|
|
190 | (1) |
|
10.1.3 Modes for using ASA devices |
|
|
190 | (1) |
|
10.1.4 An overview of AS A 5505 |
|
|
191 | (1) |
|
10.1.5 ASA levels of security |
|
|
192 | (1) |
|
10.1.6 Configuring an ASA with CLI |
|
|
193 | (5) |
|
10.2 Exercises for application |
|
|
198 | (12) |
|
10.3 Configuring Cisco elements with graphical tools |
|
|
210 | (1) |
|
10.3.1 An overview of the CCP |
|
|
210 | (1) |
|
10.3.2 An overview of the ASDM |
|
|
210 | (1) |
|
10.3.3 Using CCP and ASDM |
|
|
210 | (1) |
|
10.4 The TMG 2010 firewall |
|
|
211 | (32) |
|
|
|
211 | (1) |
|
10.4.2 Installation and configuration |
|
|
211 | (32) |
| References |
|
243 | (2) |
| Index |
|
245 | |